/system/bt/btif/src/ |
btif_mce.c | 24 * Description: Message Access Profile (MCE role) Bluetooth Interface
|
/system/bt/stack/btm/ |
btm_dev.c | 316 ** device supports role switch 320 ** Returns TRUE if device is known and role switch is supported 330 /* Role switch is not allowed if a SCO is up */ 353 /* If we don't know peer's capabilities, assume it supports Role-switch */
|
/system/bt/stack/include/ |
hcimsgs.h | 111 extern BOOLEAN btsnd_hcic_accept_conn (BD_ADDR bd_addr, UINT8 role); 328 /* Switch Role Request */ 329 extern BOOLEAN btsnd_hcic_switch_role (BD_ADDR bd_addr, UINT8 role); 335 /* Switch Role Request */ [all...] |
/external/selinux/libsemanage/src/ |
pywrap-test.py | 184 for role in rlist: 185 print " ", role 351 raise Error("Could not add role") 532 raise Error("Could not set context role") 533 if self.verbose: print "SEContext role: ", semanage.semanage_context_get_role(con) 637 raise Error("Could not set context role") 638 if self.verbose: print "SEContext role: ", semanage.semanage_context_get_role(con) 737 raise Error("Could not set interface context role") 738 if self.verbose: print "SEContext role: ", semanage.semanage_context_get_role(con) [all...] |
/external/selinux/libsepol/cil/src/ |
cil_tree.c | 551 if (context->role != NULL) { 552 cil_log(CIL_INFO, " %s", context->role->datum.name); 636 struct cil_role *role = node->data; local 637 cil_log(CIL_INFO, "ROLE: %s\n", role->datum.name); 652 if (userrole->role != NULL) { 653 datum = userrole->role; 710 if (roletype->role != NULL) { 711 datum = roletype->role; 808 cil_log(CIL_INFO, "ROLEBOUNDS: role: %s, bounds: %s\n", bnds->parent_str, bnds->child_str) [all...] |
/external/webrtc/webrtc/p2p/base/ |
port.cc | 293 // Check for role conflicts. 295 LOG(LS_INFO) << "Received conflicting role from the peer."; 496 // Send Role Conflict (487) error response. 508 // Send Role Conflict (487) error response. 695 // Adding ICE_CONTROLLED or ICE_CONTROLLING attribute based on the role. 813 IceRole role = port_->GetIceRole(); local 814 if (role != ICEROLE_UNKNOWN) { 817 if (role == ICEROLE_CONTROLLING) { [all...] |
/external/autotest/frontend/afe/ |
site_rpc_interface.py | 556 def get_servers(hostname=None, role=None, status=None): 557 """Get a list of servers with matching role and status. 560 @param role: Name of the server role, e.g., drone, scheduler. Default to 561 None to match any role. 566 @return: A list of server names for servers with matching role and status. 571 servers = server_manager_utils.get_servers(hostname=hostname, role=role,
|
/external/chromium-trace/catapult/third_party/vinn/third_party/parse5/lib/common/ |
foreign_content.js | 89 'xlink:role': {prefix: 'xlink', name: 'role', namespace: NS.XLINK},
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.osgi.services_3.2.100.v20100503.jar | |
/external/jetty/src/java/org/eclipse/jetty/security/ |
IdentityService.java | 87 * Create a new RunAsToken from a runAsName (normally a role). 88 * @param runAsName Normally a role name
|
/external/mockftpserver/MockFtpServer/ |
pom.xml | 311 <role>developer</role>
|
/external/selinux/policycoreutils/semanage/ |
semanage-bash-completion.sh | 60 __get_user_opts () { echo '$ALL_OPTS $MANAGED_OPTS -L --level -r --range -R --role '; } 100 elif [ "$verb" = "" -a "$prev" = "-R" -o "$prev" = "-r" -o "$prev" = "--role" ]; then
|
/external/selinux/policycoreutils/sepolicy/ |
info.c | 57 TYPE, ATTRIBUTE, ROLE, USER, PORT, BOOLEAN, CLASS, SENS, CATS 1003 * get a textual representation of a role, and 1004 * all of that role's types. 1200 * get statistics about a particular role; otherwise 1203 * @param name Reference to an role's name; if NULL, [all...] |
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
interface.py | 94 """ Get all domains with SELinux user role interface""" 95 """ If xml_path is specified, func returns an user role interface from specified xml file"""
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
WifiRttManagerFacade.java | 255 * Enable WiFi RTT responder role. Returns the id associated with the {@link ResponderCallback} 267 * Disable WiFi RTT responder role for the {@link ResponderCallback} identified by the given
|
/external/webrtc/webrtc/base/ |
sslstreamadapter.h | 99 // Call this to indicate that we are to play the server's role in 103 virtual void SetServerRole(SSLRole role = SSL_SERVER) = 0;
|
/hardware/intel/common/wrs_omxil_core/base/inc/ |
componentbase.h | 92 /* working role */ 302 OMX_ERRORTYPE SetWorkingRole(const OMX_STRING role);
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/ |
doxia-sink-api-1.0-alpha-7.jar | |
/prebuilts/tools/common/m2/repository/com/github/marschall/memoryfilesystem/0.6.4/ |
memoryfilesystem-0.6.4.pom | 32 <role>developer</role>
|
/system/bt/embdrv/sbc/decoder/include/ |
oi_status.h | 76 OI_STATUS_INVALID_ROLE = 132, /**< The requested role was invalid. */ 344 OI_DEVMGR_REENCRYPT_FAILED = 1335, /**< DEVMGR: failed to re-encrypt link after role switch */ 345 OI_DEVMGR_ROLE_POLICY_CONFLICT = 1336, /**< DEVMGR: requested role conflicts with current policy */ [all...] |
/system/core/rootdir/ |
init.usb.rc | 122 # USB data role changes 131 # USB power role changes
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/emr/ |
connection.py | 491 :param job_flow_role: An IAM role for the job flow. The EC2 492 instances of the job flow assume this role. The default role is 493 ``EMRJobflowDefault``. In order to use the default role, 497 :param service_role: The IAM role that will be assumed by the Amazon 732 'InstanceRole': instance_group.role,
|
/external/selinux/policycoreutils/secon/ |
secon.c | 84 " --role -r Show the role of the context.\n" 163 {"role", no_argument, NULL, 'r'}, 569 } else if (xstreq("role", name)) { 640 disp__con_val("role", NULL, &color); 693 disp__con_val("role", context_role_get(con), &color);
|
/frameworks/base/docs/html/guide/topics/connectivity/ |
bluetooth-le.jd | 59 Energy in the <em>central role</em> and provides APIs that apps can use to discover 116 device in the central role scans, looking for advertisement, and the device in 117 the peripheral role makes the advertisement.</li> 124 central role; the activity tracker supports the peripheral role (to 144 role. See {@link android.bluetooth.BluetoothGattServer} for more
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/ |
plexus-interactivity-api-1.0-alpha-4.jar | |